Author of the publication

Deinterlacing using multi direction detection with fixed adaptive tap interpolation filter.

, and . BMSB, page 1-5. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient collision attacks on smart card implementations of masked AES., , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges., , , , and . SOSR, page 16:1-16:7. ACM, (2018)A Data-Driven Study of DDoS Attacks and Their Dynamics., , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 648-661 (2020)Attacking the Edge-of-Things: A Physical Attack Perspective., , , , , , and . IEEE Internet Things J., 9 (7): 5240-5253 (2022)Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks., , and . KSII Trans. Internet Inf. Syst., 7 (5): 1094-1107 (2013)Differential Fault Attack on ITUbee Block Cipher., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 54:1-54:10 (2017)Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts., , , , , , , , , and . CoRR, (2021)SAM Meets Robotic Surgery: An Empirical Study in Robustness Perspective., , , , and . CoRR, (2023)An Efficient MLP-based Point-guided Segmentation Network for Ore Images with Ambiguous Boundary., , , , , , , and . CoRR, (2024)Analysis of Software Implemented Low Entropy Masking Schemes., , , and . Secur. Commun. Networks, (2018)